Serveur d'exploration Cyberinfrastructure

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Privacy-by-Design: Understanding Data Access Models for Secondary Data

Identifieur interne : 000248 ( Pmc/Checkpoint ); précédent : 000247; suivant : 000249

Privacy-by-Design: Understanding Data Access Models for Secondary Data

Auteurs : Hye-Chung Kum ; Stanley Ahalt

Source :

RBID : PMC:3845756

Abstract

Today there is a constant flow of data into, out of, and between ever-larger and ever-more complex databases about people. Together, these digital traces collectively capture our social genome , the footprints of our society. The burgeoning field of population informatics is the systematic study of populations via secondary analysis of such massive data collections (termed “big data”) about people. In particular, health informatics analyzes electronic health records to improve health outcomes for a population. Privacy protection in such secondary data analysis research is complex and requires a holistic approach which combines technology, statistics, policy and a shift in culture of information accountability through transparency rather than secrecy. We review state of the art in privacy protection technology and policy frameworks from widely different fields, and synthesize the findings to present a comprehensive system of privacy protection in population informatics research using the privacy-by-design approach. Based on common activities in the workflow, we describe the pros and cons of four different data access models – restricted access, controlled access, monitored access, and open access – that minimize risk and maximize usability of data. We then evaluate the system by analyzing the risk and usability of data through a realistic example. We conclude that deployed together the four data access models can provide a comprehensive system for privacy protection, balancing the risk and usability of secondary data in population informatics research.


Url:
PubMed: 24303251
PubMed Central: 3845756


Affiliations:


Links toward previous steps (curation, corpus...)


Links to Exploration step

PMC:3845756

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Privacy-by-Design: Understanding Data Access Models for Secondary Data </title>
<author>
<name sortKey="Kum, Hye Chung" sort="Kum, Hye Chung" uniqKey="Kum H" first="Hye-Chung" last="Kum">Hye-Chung Kum</name>
<affiliation>
<nlm:aff>NONE</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Ahalt, Stanley" sort="Ahalt, Stanley" uniqKey="Ahalt S" first="Stanley" last="Ahalt">Stanley Ahalt</name>
<affiliation>
<nlm:aff>NONE</nlm:aff>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmid">24303251</idno>
<idno type="pmc">3845756</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3845756</idno>
<idno type="RBID">PMC:3845756</idno>
<date when="2013 ">2013 </date>
<idno type="wicri:Area/Pmc/Corpus">000470</idno>
<idno type="wicri:Area/Pmc/Curation">000470</idno>
<idno type="wicri:Area/Pmc/Checkpoint">000248</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">Privacy-by-Design: Understanding Data Access Models for Secondary Data </title>
<author>
<name sortKey="Kum, Hye Chung" sort="Kum, Hye Chung" uniqKey="Kum H" first="Hye-Chung" last="Kum">Hye-Chung Kum</name>
<affiliation>
<nlm:aff>NONE</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Ahalt, Stanley" sort="Ahalt, Stanley" uniqKey="Ahalt S" first="Stanley" last="Ahalt">Stanley Ahalt</name>
<affiliation>
<nlm:aff>NONE</nlm:aff>
</affiliation>
</author>
</analytic>
<series>
<title level="j">AMIA Summits on Translational Science Proceedings</title>
<idno type="eISSN">2153-4063</idno>
<imprint>
<date when="2013 ">2013 </date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<p>
<italic>Today there is a constant flow of data into, out of, and between ever-larger and ever-more complex databases about people. Together, these digital traces collectively capture our
<bold>social genome </bold>
, the footprints of our society. The burgeoning field of
<bold>population informatics </bold>
is the systematic study of populations via secondary analysis of such massive data collections (termed “big data”) about people. In particular,
<bold>health informatics </bold>
analyzes electronic health records to improve health outcomes for a population. Privacy protection in such secondary data analysis research is complex and requires a holistic approach which combines technology, statistics, policy and a shift in culture of information accountability through transparency rather than secrecy. We review state of the art in privacy protection technology and policy frameworks from widely different fields, and synthesize the findings to present a comprehensive system of privacy protection in population informatics research using the privacy-by-design approach. Based on common activities in the workflow, we describe the pros and cons of four different data access models – restricted access, controlled access, monitored access, and open access – that minimize risk and maximize usability of data. We then evaluate the system by analyzing the risk and usability of data through a realistic example. We conclude that deployed together the four data access models can provide a comprehensive system for privacy protection, balancing the risk and usability of secondary data in population informatics research. </italic>
</p>
</div>
</front>
<back>
<div1 type="bibliography">
<listBibl>
<biblStruct>
<analytic>
<author>
<name sortKey="Lane X0a, J X0a" uniqKey="Lane X0a J">J Lane </name>
</author>
<author>
<name sortKey="Heus X0a, P X0a" uniqKey="Heus X0a P">P Heus </name>
</author>
<author>
<name sortKey="Mulcahy X0a, T X0a" uniqKey="Mulcahy X0a T">T Mulcahy </name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Shapiro X0a, S X0a" uniqKey="Shapiro X0a S">S Shapiro </name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Weitzner X0a, Dj X0a" uniqKey="Weitzner X0a D">DJ Weitzner </name>
</author>
<author>
<name sortKey="Abelson X0a, H X0a" uniqKey="Abelson X0a H">H Abelson </name>
</author>
<author>
<name sortKey="Berners Lee X0a, T X0a" uniqKey="Berners Lee X0a T">T Berners-Lee </name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Sapuntzakis X0a, C X0a" uniqKey="Sapuntzakis X0a C">C Sapuntzakis </name>
</author>
<author>
<name sortKey="Brumley X0a, D X0a" uniqKey="Brumley X0a D">D Brumley </name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kum X0a, Hc X0a" uniqKey="Kum X0a H">HC Kum </name>
</author>
<author>
<name sortKey="Ahalt X0a, S X0a" uniqKey="Ahalt X0a S">S Ahalt </name>
</author>
<author>
<name sortKey="Pathak X0a, D X0a" uniqKey="Pathak X0a D">D Pathak </name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Fienberg X0a, Se X0a" uniqKey="Fienberg X0a S">SE Fienberg </name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Nissenbaum X0a, Hf X0a" uniqKey="Nissenbaum X0a H">HF Nissenbaum </name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lane X0a, J X0a" uniqKey="Lane X0a J">J Lane </name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Shoffner X0a, M X0a" uniqKey="Shoffner X0a M">M Shoffner </name>
</author>
<author>
<name sortKey="Mostafa X0a, J X0a" uniqKey="Mostafa X0a J">J Mostafa </name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Yung X0a, Rl X0a" uniqKey="Yung X0a R">RL Yung </name>
</author>
<author>
<name sortKey="Chen X0a, K X0a" uniqKey="Chen X0a K">K Chen </name>
</author>
<author>
<name sortKey="Abel X0a, Ga X0a" uniqKey="Abel X0a G">GA Abel </name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Duncan X0a, G X0a" uniqKey="Duncan X0a G">G Duncan </name>
</author>
<author>
<name sortKey="Keller Mcnulty X0a, S X0a" uniqKey="Keller Mcnulty X0a S">S Keller-McNulty </name>
</author>
<author>
<name sortKey="Stokes X0a, S X0a" uniqKey="Stokes X0a S">S Stokes </name>
</author>
</analytic>
</biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<pmc article-type="research-article">
<pmc-dir>properties open_access</pmc-dir>
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">AMIA Jt Summits Transl Sci Proc</journal-id>
<journal-id journal-id-type="iso-abbrev">AMIA Jt Summits Transl Sci Proc</journal-id>
<journal-title-group>
<journal-title>AMIA Summits on Translational Science Proceedings</journal-title>
</journal-title-group>
<issn pub-type="epub">2153-4063</issn>
<publisher>
<publisher-name>American Medical Informatics Association </publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="pmid">24303251</article-id>
<article-id pub-id-type="pmc">3845756</article-id>
<article-id pub-id-type="publisher-id">amia_cri_2013_126 </article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Articles</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Privacy-by-Design: Understanding Data Access Models for Secondary Data </article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Kum</surname>
<given-names>Hye-Chung</given-names>
</name>
<degrees>PhD </degrees>
<xref ref-type="aff" rid="af1-amia_cri_2013_126">
<sup>1 </sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Ahalt</surname>
<given-names>Stanley</given-names>
</name>
<degrees>PhD </degrees>
<xref ref-type="aff" rid="af1-amia_cri_2013_126">
<sup>1 </sup>
</xref>
</contrib>
</contrib-group>
<aff id="af1-amia_cri_2013_126">
<label> 1</label>
NC-TraCS & Dept of Computer Science, University of North Carolina, Chapel Hill, NC</aff>
<pub-date pub-type="collection">
<year>2013 </year>
</pub-date>
<pub-date pub-type="epub">
<day>18 </day>
<month>3</month>
<year>2013 </year>
</pub-date>
<volume>2013</volume>
<fpage>126</fpage>
<lpage>130</lpage>
<permissions>
<copyright-statement>©2013 AMIA - All rights reserved. </copyright-statement>
<copyright-year>2013 </copyright-year>
</permissions>
<abstract>
<p>
<italic>Today there is a constant flow of data into, out of, and between ever-larger and ever-more complex databases about people. Together, these digital traces collectively capture our
<bold>social genome </bold>
, the footprints of our society. The burgeoning field of
<bold>population informatics </bold>
is the systematic study of populations via secondary analysis of such massive data collections (termed “big data”) about people. In particular,
<bold>health informatics </bold>
analyzes electronic health records to improve health outcomes for a population. Privacy protection in such secondary data analysis research is complex and requires a holistic approach which combines technology, statistics, policy and a shift in culture of information accountability through transparency rather than secrecy. We review state of the art in privacy protection technology and policy frameworks from widely different fields, and synthesize the findings to present a comprehensive system of privacy protection in population informatics research using the privacy-by-design approach. Based on common activities in the workflow, we describe the pros and cons of four different data access models – restricted access, controlled access, monitored access, and open access – that minimize risk and maximize usability of data. We then evaluate the system by analyzing the risk and usability of data through a realistic example. We conclude that deployed together the four data access models can provide a comprehensive system for privacy protection, balancing the risk and usability of secondary data in population informatics research. </italic>
</p>
</abstract>
</article-meta>
</front>
</pmc>
<affiliations>
<list></list>
<tree>
<noCountry>
<name sortKey="Ahalt, Stanley" sort="Ahalt, Stanley" uniqKey="Ahalt S" first="Stanley" last="Ahalt">Stanley Ahalt</name>
<name sortKey="Kum, Hye Chung" sort="Kum, Hye Chung" uniqKey="Kum H" first="Hye-Chung" last="Kum">Hye-Chung Kum</name>
</noCountry>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/CyberinfraV1/Data/Pmc/Checkpoint
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000248 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Pmc/Checkpoint/biblio.hfd -nk 000248 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    CyberinfraV1
   |flux=    Pmc
   |étape=   Checkpoint
   |type=    RBID
   |clé=     PMC:3845756
   |texte=   Privacy-by-Design: Understanding Data Access Models for Secondary Data

}}

Pour générer des pages wiki

HfdIndexSelect -h $EXPLOR_AREA/Data/Pmc/Checkpoint/RBID.i   -Sk "pubmed:24303251" \
       | HfdSelect -Kh $EXPLOR_AREA/Data/Pmc/Checkpoint/biblio.hfd   \
       | NlmPubMed2Wicri -a CyberinfraV1 

Wicri

This area was generated with Dilib version V0.6.25.
Data generation: Thu Oct 27 09:30:58 2016. Site generation: Sun Mar 10 23:08:40 2024